P
Sub RosaEst. MMXXV
By Invitation Only

Phantom

A house of quiet recourse for protocols that require neither speed nor spectacle — only the certainty that what approaches in the dark will not arrive.

Sub RosaDeFi SecurityNine ChainsBy Invitation
SVB · ROSA · DICTVM · SVB · ROSA · DICTVM · P
§ I. The Credo
Discretion is not a feature. It is the foundation. Phantom exists where attacks are planned in silence and executed in seconds. We do not advertise our methods. We do not reveal our clients. We answer only the threat that believed no one was watching.
§ 01 / PHANTOM
The Shadow
We deploy a mirror of your protocol in the dark. Every wallet that probes it is recorded before it reaches you. The attacker believes they found a target. They found us first.
§ 02 / IMMUNE
The Response
When probe converts to intent, IMMUNE moves. Not an alert. Not a suggestion. A pause, executed before the drain completes. The window closes in the same block it opened.
§ 03 / TRACE
The Ledger
What is taken leaves a trail. TRACE follows it across nine chains, through mixers and bridges, to the exchange where a name waits behind a wallet. Every Marker is settled.
§ II. The Kill Chain
01
Augur
The oracle. Multi-agent simulation maps every attack vector before a line is audited.
02
Cobalt
Formal audit. The bug is found before the code is deployed.
03
Cassandre
Continuous watch. Every invariant, every block, in production.
04
Phantom
The shadow. Attackers probe us before they reach you.
05
Immune
The pause. Executed in the block the attacker expected to drain.
06
Trace
The pursuit. Nine chains. No mixer deep enough. No Marker forgotten.
07
Vantum
The sovereign layer. Maritime intelligence. Zero foreign hops. No foreign court.
§ IV. The Scanner
Before the shadow deploys, the perimeter is mapped. NetScan reveals what is open, what listens, and what the attacker will see — so that when they arrive, nothing is exposed that was not intended.
TCP Connect · Service Fingerprinting · Banner Grabbing · Top 20 Ports
§ V. The House is Accepting Markers
Design Partners
Phantom operates by invitation and by Marker. Design partner positions are open for protocols launching in the next ninety days. The first ninety days are on the house. One probe caught during that window and the obligation is mutual — coverage continues, the Marker is signed.
Request a Marker →
By Invitation · NDA Required · Continental Standards Apply
DICTVM · SVB · ROSA · DICTVM · SVB · ROSA · P
40.7589° N73.9851° W
● Phantom Active9 Chains0 Exploits LandedTLS 1.3